Security Now! - ISIS Papyrus

<ECM/SECURITY>
Security Now!
Enterprise Content Management - ECM
INSIDE
ISIS Papyrus provides ECM applications with the industry’s first deep-integrated
application and system security.
 Bringing privacy regulation compliance to electronic documents.
 Organizations can enforce corporate security policies and avoid human error or fraud.
 Provide Digital Signatures for Workflow sign-off.
 Ensure document confidentiality and long-term archive integrity.
 Authenticated and encrypted e-mail communication.
Document Control and Security
The Papyrus Document System provides perfect control over how, when,
and by whom your documents are captured, created, accessed, changed,
deleted and archived. The benefits of using Papyrus security are:
J
Reduced potential damage risk
J
Increased productivity across all document applications
J
Simplified log-on procedures
J
Substantially lower cost for ensuring regulatory compliance
User Authentication
SmartCard Reader
Certificate and
fingerprint on chip
Document
digitally signed
by the user
Certificate Store
Role/Policy
Audit logs stored
Encrypted
communication
Data and documents
in storage are
digitally signed and encrypted
 Authentication is equivalent to showing your drivers
license at the ticket counter at the airport. It is used to identify
who has for example, signed a document in a business process. Many countries have legally validated the use of Electronic Signatures, as has the United States since October 1st,
2000. Regulation does usually not specify a digital signature
technology, but many experts consider that Public Key Infrastructure (PKI) will play an important role.
policy. This involves requesting a minimum password length,
minimum password complexity, enforced password aging,
and prohibiting password reuse as well as inactivity time-outs.
All this does not prevents users from writing passwords down
or sharing them with others. The identity of the security administrator is also not ensured. Many existing applications use
password transfers in clear text, and the central login creates
issues with offline use or with network problems.
The integrated SmartCard User Authentication functionality
in Papyrus provides secure user authentication. To log on to
­Papyrus the card itself (authentication by possession) as well as
a PIN (authentication by knowledge) or optional biometric fingerprint identification (authentication by identity). Logon authentication is usually achieved by trying to enforce a password
Using a SmartCard with fingerprint reader ensures a user’s
identity and enforces compliance without the possibility for human error. Once the card is pulled from the reader, all ­Papyrus
applications (optionally the workstation) are locked out. The
user certificate and fingerprint is securely stored on the card
and thus authentication does not require network access.
ISIS Papyrus
SECURITY WHITE PAPER
The following security concepts are implemented in Papyrus:
Authentication: Ensure that a user is identified with certainty.
Confidentiality: Encrypt the document and data transmissions.
Authorization: Control what someone can do with a document or workflow.
Accountability: Track what someone did with a document.
Authenticity: Verify the originality and source of a document.
Auditing: Being able to create a full compliance record.
 Confidentiality is ensured within Papyrus by encrypting the data transmissions and all data objects stored. For
Web applications Papyrus uses HTTPs, the secure version of
HTTP, the communication protocol of the World Wide Web. It
provides authentication and encrypted communication for
browser access to a WebPortal server.
 Authorization defines what a person, once identified,
is permitted to do with an application or system resource.
This is usually determined by being a member of a particular
group, equivalent to checking for your ticket when you go to
the theatre. Papyrus Objects uses an integrated authorization
system, to ensure that no user or program can access or do
anything without the proper authorization.
also be written into an audit log. Thus the user can at all times
be held accountable for his actions. This is mostly important
for System or Security Administrators, Change Management
Administrators, Production Managers or users who sign off application or document changes.
 Authenticity: Once a document becomes a corporate record or achieves a legal status as part of a contract, the
workflow state is changed and the document is encrypted and
digitally signed. The document can now only be opened by
authorized parties and as long as the signature is intact, the
authenticity of the original can be verified without the need
for storing the document to Write-Only media. Only users who
have the authority to access the private key of the document
can actually read it.
Once the corporate organization is defined in principle,
the application roles to be implemented with Papyrus need to
be defined.
PRIVILEGE PRIVILEGE
“add”
“edit”
ROLE
“clerk”
ROLE
“clerk”
POLICY
“USA”
USER
“Max”
valid
from
METHOD
“add”
valid
to
POLICY
“USA”
INSTANCE
“Letter”
POLICY
“USA”
Each user receives at least one ROLE. This ROLE has defined
either a privilege string or an actual method of an object. To
define which resource INSTANCES a user is allowed to access,
also a POLICY authorization is needed, which has to match
the POLICY defined for the object. The user may be allowed
to perform a method for a particular type of letter, but is only
allowed to access this type of letter of a specific department.
The Papyrus LDAP Adapter allows the use of existing user roles
available in LDAP directories, such as RACF.
 Accountability is achieved by a combination of user
authentication and setting up the auditing functions for a
workflow and its related documents. As you have identified
the user by his SmartCard and fingerprint, his ROLE and POLICY ensure what he can access, and all activities of the user can
Auditing Analysis Output
 Auditing is the tracking of activity by users as per the
systems definition. This stored information allows authorized
users to conduct audits. Typical audits are related to changes
in security definitions or which way a document was routed
and who accessed it. This is accomplished by using security
functions such as authentication and data logging. Standard
Papyrus document design, scheduling and distribution features controls when and which reports are formatted how and
distributed to whom.
MOTIVATIONS for INNOVATION
Motivation: Innovation: Solution: Compliance with privacy and record
keeping regulations
Full security integration for ECM with
SmartCard authentication
Security functions of the Papyrus
Document Switchboard
A c o m p r e h e n s i v e a n d s c a l a b l e s o l u t i o n for centralized
management of document applications, print and output operations that
span web, client/ser ver and host environments.
TIFF, PDF, AFP
Windows
Linux
UNIX
Papyrus
WebPortal
HTTP, POP3,
SMTP, SMS, FAX, PDF
ASCII, XML,
SAP, IIOP
CRM, ERP, Reporting,
Business Systems
Paper
z/OS
COBOL, MQ,
CICS/IMS/DB2
Papyrus Document Frameworks
Archive
PCs
Scan,
Capture, Extract
IPDS, PCL5, PS,
IJPDS, Xerox
O Automated Document Factory
O Enterprise Application Integration
O Enterprise Output Management
O Enterprise Content Management
O Business Process Management
O Portal and Web Applications
O Change Management
O Correspondence
O Campaign Management
O Print Management
O Capture/Classify/Extract
O E-mail, Fax
Organizations can d e f i n e , m e a s u r e , a n d m a n a g e output
management across complex heterogeneous environments from
centralized control points.
Papyrus Capture
Papyrus Designer Suite
Scan • Capture • Classify • E-mail • Fax
Forms • Fonts • Logos • Pagemode Formatting
Papyrus Client
Papyrus Objects
View & Print
Texteditor
Desktop
Repository • Library • Distribution
Authorization • Business Objects (data)
MQ • XML Interface • Process Support
Papyrus
DocExec
Text and Page
Document Formatter
PrintPool & Archive
Papyrus Host & Server
Indexing • Sorting • Bundling • Distribution
AFP • Printing & Spooling • Print Transforms
Pa py ru s Co m p o n e nt s
IPDS
FAX
TIFF
POSTSCRIPT
PDF
HP-LASERJET
and PCL4/5
XEROX METACODE
A selection from over 2000 ISIS Papyrus References:
Finance Sector uses Papyrus
ISIS Locations
International Headquarters, Austria
ISIS Information Systems GmbH
ISIS Marketing Service GmbH
ISIS Knowledge Systems GmbH
Alter Wienerweg 12
A-2344 Maria Enzersdorf
T: +43-2236-27551-0
F: +43-2236-21081
E-mail: [email protected]
US Headquarters
ISIS Papyrus America, Inc.
301 Bank St.
Southlake, TX 76092
T: 817-416-2345
F: 817-416-1223
Asia-Pacific Headquarters
ISIS Papyrus Asia Pacific Ltd
9 Temasek Blvd.
#15-03 Suntec City Tower 2
Singapore 038989
T: +65-6339-8719
F: +65-6336-6933
England
ISIS Papyrus UK Ltd
25 Cherry Orchard North
Kembrey Park
Swindon
Wiltshire SN2 8UH
T: +44-1793-644616
F: +44-1793-692978
Germany
ISIS Papyrus Deutschland GmbH
Heerdter Lohweg 81
40549 Düsseldorf T: +43-2236-27551-0
F: +43-2236-21081
Benelux
ISIS Papyrus Benelux
Braine l´Alleud Parc de l´Alliance
9, Boulevard de France, bât A
1420 Braine l´Alleud
T: +32-2-352-8720
F: +32-2-352-8802
Citibank, Deutsche Bank, Commerzbank, UBS, Credit Suisse, BNP, Capital One
Italy
Insurance uses Papyrus
ISIS Papyrus Italy Srl
via Monte Navale 11
10015 Ivrea (TO)
T: +39-0125-6455-00
F: +39-0125-6455-150
Allianz, Generali, Thrivent, RAS, Great West Life, Sun Life, HBOS, Zürich
Healthcare uses Papyrus
AXA, HUK, Empire Health Choice, Siemens Medical Systems, Sanitas, Hallische
Te l e c o m m u n i c a t i o n u s e s Pa p y r u s
Bell South, SwissCom, T-Mobile, Debitel, Orange, Singapore Telecom, Belgacom
Public Sector uses Papyrus
Commonwealth of Pennsylvania, European Patent Office, Stadt Düsseldorf
Manufacturing uses Papyrus
Avon Cosmetics, Bally Shoes, BASF, Canon, IKEA, Miele & Cie, Renault, Volkswagen
France
ISIS Papyrus France SARL
La Grande Arche Paroi Nord
92044 Paris La Défense
T: +33-1-40903510
F: +33-1-40903501
Spain
ISIS Thot SL.
Sainz de la Calleja, 14
28023 Madrid
T: +34-91-307-78-41
F: +34-91-307-75-08
www.isis-papyrus.com